MCPSERV.CLUB
HaroldFinchIFT

NIST NVD MCP Server

MCP Server

Query the NIST Vulnerability Database via Model Context Protocol

Stale(60)
4stars
2views
Updated 26 days ago

About

A lightweight MCP server that wraps the NIST National Vulnerability Database API, providing tools for temporal context, CVE search, CPE lookups, KEV catalog queries, and change history. It supports date filtering, automatic chunking, and parallel processing for efficient LLM integration.

Capabilities

Resources
Access data sources
Tools
Execute functions
Prompts
Pre-built templates
Sampling
AI model interactions

Vulnerability Search Workflow

The vuln‑nist‑mcp‑server is a purpose‑built MCP endpoint that turns the NIST National Vulnerability Database (NVD) into a first‑class AI tool. By exposing a curated set of tools—, , , and more—the server lets conversational assistants answer questions about software security, historical vulnerability trends, or regulatory compliance without leaving the chat. Developers can embed this service into any MCP‑compatible workflow, allowing LLMs to fetch real‑time data and deliver it in natural language.

What problem does this solve? Traditional LLMs lack direct access to up‑to‑date vulnerability feeds, forcing users to rely on static knowledge bases or manual API calls. This MCP server removes that friction by providing ready‑to‑use, well‑validated query interfaces. Whether a user asks “What CVEs were discovered in the last 30 days for Apache HTTP Server?” or “Show me all CISA KEV entries added between March 1 and March 15,” the assistant can retrieve, filter, and format results instantly. The server’s built‑in temporal awareness (via ) ensures that relative time expressions are correctly interpreted, preventing ambiguous queries.

Key capabilities include:

  • Flexible date filtering – Accept both relative () and absolute (/) ranges, automatically prioritizing the most specific parameters.
  • Automatic chunking and parallelism – Large ranges (over 120 days for CVEs, over 90 days for KEVs) are split into smaller requests and processed concurrently, keeping response times low even when the NVD throttles calls.
  • Robust input validation – CPE strings are checked against the 2.3 schema, dates are parsed safely, and parameter sanitization protects against malformed requests.
  • Consistent ordering – Results are sorted by publication or change date (newest first), which aligns with typical analyst workflows and improves readability in chat outputs.
  • Emoji‑based status indicators – Quick visual feedback (✅, ⚠️, 🔍) helps developers spot success or failure without parsing verbose logs.

In real‑world scenarios, security teams can integrate this server into incident response playbooks: a LLM can automatically pull the latest CVEs affecting a fleet of software, cross‑reference them with internal asset lists, and even trigger ticketing systems. Compliance auditors can ask for all vulnerabilities that meet a specific CPE or KEV window, and the assistant will return a concise summary. Because the MCP protocol decouples the client from the underlying API, teams can swap in alternative vulnerability feeds or extend the server with custom endpoints without changing the assistant code.

Overall, the vuln‑nist‑mcp‑server provides a seamless bridge between conversational AI and authoritative vulnerability data, empowering developers to build smarter security tools that react in real time while keeping the complexity of API integration hidden behind a clean, MCP‑compatible interface.